← Voltar para CVEs
CVE-2026-1323
N/ADescricao
The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado3/17/2026
Ultima modificacao3/17/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-502
Referencias
https://typo3.org/security/advisory/typo3-ext-sa-2026-005(f4fb688c-4412-4426-b4b8-421ecf27b14a)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.